Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2024, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
5b4d9ad66a1a6004cf278c59c7c2e263_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5b4d9ad66a1a6004cf278c59c7c2e263_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
5b4d9ad66a1a6004cf278c59c7c2e263_JaffaCakes118.html
-
Size
139KB
-
MD5
5b4d9ad66a1a6004cf278c59c7c2e263
-
SHA1
bb13d328f7bc7b2a8b2883147a5a88bc456b5986
-
SHA256
ddb524230405b1e806ce6b3bbb26dca62c8740b749018aad96783485dc9699e7
-
SHA512
4be5f850631701377e2fe025e1ad16444383ec4d1e21a995975146a5a924a5ee80ff55cba7142602003e2933a453c3c4be19d8a6bd280bfdad355d6ba724dab2
-
SSDEEP
1536:SqwaPIPjjXrhgfFOVXY603rtas0Ls3jmmJPWJE+BN01f4LJtcqSw0/PbKt4QzJlD:S2Y4yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3452 msedge.exe 3452 msedge.exe 2524 msedge.exe 2524 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2524 msedge.exe 2524 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2524 wrote to memory of 536 2524 msedge.exe 83 PID 2524 wrote to memory of 536 2524 msedge.exe 83 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 2160 2524 msedge.exe 84 PID 2524 wrote to memory of 3452 2524 msedge.exe 85 PID 2524 wrote to memory of 3452 2524 msedge.exe 85 PID 2524 wrote to memory of 4040 2524 msedge.exe 86 PID 2524 wrote to memory of 4040 2524 msedge.exe 86 PID 2524 wrote to memory of 4040 2524 msedge.exe 86 PID 2524 wrote to memory of 4040 2524 msedge.exe 86 PID 2524 wrote to memory of 4040 2524 msedge.exe 86 PID 2524 wrote to memory of 4040 2524 msedge.exe 86 PID 2524 wrote to memory of 4040 2524 msedge.exe 86 PID 2524 wrote to memory of 4040 2524 msedge.exe 86 PID 2524 wrote to memory of 4040 2524 msedge.exe 86 PID 2524 wrote to memory of 4040 2524 msedge.exe 86 PID 2524 wrote to memory of 4040 2524 msedge.exe 86 PID 2524 wrote to memory of 4040 2524 msedge.exe 86 PID 2524 wrote to memory of 4040 2524 msedge.exe 86 PID 2524 wrote to memory of 4040 2524 msedge.exe 86 PID 2524 wrote to memory of 4040 2524 msedge.exe 86 PID 2524 wrote to memory of 4040 2524 msedge.exe 86 PID 2524 wrote to memory of 4040 2524 msedge.exe 86 PID 2524 wrote to memory of 4040 2524 msedge.exe 86 PID 2524 wrote to memory of 4040 2524 msedge.exe 86 PID 2524 wrote to memory of 4040 2524 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5b4d9ad66a1a6004cf278c59c7c2e263_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb8a9846f8,0x7ffb8a984708,0x7ffb8a9847182⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,15754002700301423387,9937779640845374257,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,15754002700301423387,9937779640845374257,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,15754002700301423387,9937779640845374257,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,15754002700301423387,9937779640845374257,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,15754002700301423387,9937779640845374257,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,15754002700301423387,9937779640845374257,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4936 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4744
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1820
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD543854b8271a4217901f91e0adc8f839a
SHA1694e559c802e69bea9072982a360d29be46ec71a
SHA256be61c44c9c848b96fef8f5cfeda348e43518954eb9ed8d9c3e686bd8050a15ba
SHA512f63f6c06cc38cc02165650bd4e6b1865243345eeb1e5eac57016c65e54bef9858fd33e2eea1744dc675df7f7149460949696eae4529c86eb8a987069073cba8a
-
Filesize
6KB
MD57cbb09191e3241955cdf197a957116dc
SHA15298fbc0396e9a1da23c290616096448f945a839
SHA2560b20cfeb0c09ffdef25522324719a5a2675db1ff16eb2ce473c6f59b8e4a3ca3
SHA51288d02c005adb99932a64d49627e8a52f25b973f6d5c5d7397d8cb44ac92286fe6be522e6e76df233efcf7c1a351e759893f76025363550998a5cc8072fa29f17
-
Filesize
11KB
MD569f94ad13a4fcfe7ed1858fdbc42a5b1
SHA1c33ce2ddee0989a50576f29376c08e0efc614ef6
SHA2568a56743ad682e21ff35868aadde8f4835b8e8f4f1ae6dd5fc330691aaf7d72c6
SHA5121e6f8db20318a4bb4d57a9cafc3293b1400947766dcaf7b43785c592fefabb220857c9eb22e9fbfed3da0b3bb90c643f08cc92eefda91db7777009e1b8facd38